© Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG.

Slides:



Advertisements
Similar presentations
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Effective PR: the Power of Three Craig Coward Context Public Relations.
Advertisements

INTERNATIONAL CLOUD SOFTWARE SYMPOSIUM, HELSINKI,
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Reference Architecture Subgroup NIST Big Data Public Working Group Reference Architecture Subgroup September 30, 2013 Co-chairs: Orit LevinMicrosoft James.
Fraud Detection in Banking using Big Data By Madhu Malapaka For ISACA, Hyderabad Chapter Date: 14 th Dec 2014 Wilshire Software.
ONS Big Data Project. Plan for today Introduce the ONS Big Data Project Provide a overview of our work to date Provide information about our future plans.
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
NIST Big Data Public Working Group Reference Architecture Subgroup September 30, 2013 Co-chairs: Orit LevinMicrosoft James KetnerAT&T Don KrapohlAugmented.
NIST BIG DATA WG Reference Architecture Subgroup Meeting Agenda Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence)
John Howie Big Data: Answering Questions and Solving Society’s Problems, but at What Cost?
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
8/15/2013NIST Big Data WG / Ref Arch Subgroup1 NIST Big Data Program Alignment: Roadmap & Reference Architecture Version 1.3 Roadmap Subgroup NIST Big.
U.S. Department of the Interior U.S. Geological Survey CDI Webinar Series 2013 Mobile Framework Lorna Schmid, AEI Tim Kern, Fort Collins Science Center.
Opportunities and Challenges for Public Auditors.
Business Intelligence: The Next Big Thing (Really!) John Bair CTO, Ajilitee Sep 14, 2012 Presented to TDWI St. Louis Chapter.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
TWO MINUTE INTRODUCTION The Internet of Things – Automatski Corp. E: Founder &
CREATING THE ENTERPRISE SOCIAL MEDIA GAME PLAN September 2013.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Data Science for International Data Week 2016: Concept Dr. Brand Niemann Director and Senior Data Scientist/Data Journalist Semantic Community Data Science.
NIST BIG DATA WG Reference Architecture Subgroup Draft Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence) August.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
1 IRS XML Initiatives Sol Safran Enterprise Data Management Organization 21 April 2004 IRS XML Initiatives Sol Safran Enterprise Data Management Organization.
© 2013 IBM Corporation CMO and CIO: Friends with digital benefits iStrategy – May 15, 2013 Surjit Chana CMO, IBM
© Cloud Security Alliance, 2015 Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
NIST BIG DATA WG Reference Architecture Subgroup Intermediate Report Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence)
Challenge 6: Mobility, Environmental sustainability and energy efficiency Includes as driving objective: “Sustainable growth and environmental sustainability”
Machine Learning as a Service
NIST BIG DATA WG Reference Architecture Subgroup Draft Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented Intelligence) August.
Datalayer Notebook Allows Data Scientists to Play with Big Data, Build Innovative Models, and Share Results Easily on Microsoft Azure MICROSOFT AZURE ISV.
Corporate Services Restructuring 31 March Introduction  The AG completed the restructuring of Corporate Services in November 2005  The restructuring.
Amagees Tech Corp value added services Data Management and Infrastructure.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Documents.
Role Activity Sub-role Functional Components Control Data Software.
Cybersecurity is not a new issue! Dr. Edgar Frank Codd, an IBM researcher, wrote a paper that described the fundamental model of the relational databases.
Information Eastman. Business Process Skills Order to Cash, Forecasting & Budgeting, etc. Process Modeling Project Management Technical Skills.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Internet of Things. Creating Our Future Together.
Agenda © 2015 | Tel: (980) | Big Data: Types of data and benefits Implementation Challenges / Risks Tools & Platforms.
By RevelOps Logentries DataHub is offering the first cloud-based service for log management real-time analytics designed to enable security, privacy, and.
The WEB Expert learn & Krisztián Ohr Webmark Europe Kft.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Mobile Application Security Testing (MAST) project Keng Lee March 2016.
© Cloud Security Alliance, 2016 Brian Russell, Leidos Co-Chair, IoT WG 2 March 2016.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Easy way to check if you have large Folders or Files Another way to check if you have large Folders or Files Deleting Files and Folders Flexible IT supporting.
Leverage Big Data With Hadoop Analytics Presentation by Ravi Namboori Visit
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |1 Accelerate Your Digital Transformation Innovate, Integrate, Collaborate #paas.
Big Data Enterprise Patterns
Practical Machine Learning for Cloud Intrusion Detection
Making Information Security Manageable with GRC
Microsoft Azure Enables Big-Data-as-a-Service Applications for Industry and Government Use “Microsoft Azure is the most innovative and robust suite of.
Big Data Young Lee BUS 550.
Digital Science Center
Digital Policy -Transformation Towards Society 5.0-
Jørgen Friis, ETSI VP SES
ATIS’ Cloud Activity Andrew White Nokia Siemens Networks
Big DATA.
Blockchain: What Board Directors Need to Know
Presentation transcript:

© Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG

Agenda © Cloud Security Alliance, Big Data Level Set 2.Who are we? 3.What do we do? 4.What have we done so far? 5.What are we working on? 6.Q&A

Big Data Level Set © Cloud Security Alliance, 2015

© Cloud Security Alliance, 2015.

‘Word on the street’ Sliding window Dimensions don’t always expand in the same directions. Examples: Twitter feeds (small data, but very high velocity) Hubble Telescope pictures (large pic, but low volume) Is Unstructured Data really unstructured?

What’s next in BD? Fast data (e.g., IoT) Climb up the BD stack Visualization Applying BD techniques to ‘Dark Data’ (e.g., Ayasdi) And much more… © Cloud Security Alliance, 2015.

BD Security… Yeah, what about it? © Cloud Security Alliance, 2015

© Cloud Security Alliance, Source: Verizon Big Data White Paper “How to thrive on the frontiers of data” Internal External Owned, subscribed, bought Format Governance Data silos Storage infrastructure Data Scientists Predictive Prescriptive Visualization Think different Not always why Plug information in business process Actionable Big Data Life Cycle

© Cloud Security Alliance, Still need to balance Risk Profile Security Requirements (CIAA) Business Requirements

© Cloud Security Alliance, And also ensure data qualities Source: ISACA White Paper “Big Data – Impact & Benefits”, March 2013

© Cloud Security Alliance, Can’t we just use current security controls and standards? Well, Yes and No…

Change of playing field… New Paradigm/Technology The Big Data V’s  Data Explosion Cloud: cheap & easy access to compute & storage Data on the go  Mobility all the way Data without borders Difference in international legislation … © Cloud Security Alliance, 2015.

So, there is work to do… © Cloud Security Alliance, 2015

Nice to meet you! © Cloud Security Alliance, 2015

Who are we? Started April 2012 Focus on Big Data Privacy & Security Different Initiatives/sub working groups Works together with other orgs, like NIST Leadership team: Chair - Sree Rajan, Fujitsu Co-Chair - Wilco van Ginkel, Verizon Co-chair - Neel Sundaresan, Ebay © Cloud Security Alliance, 2015.

Our Journey © Cloud Security Alliance, Develop best practices for security and privacy in big data Support industry and government on adoption of best practices Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues

Focus areas © Cloud Security Alliance, Security Analytics Cryptography and Privacy Technologies Infrastructure Security Privacy, Policy, Governance and Legal Issue Framework and Taxonomy

What have we done so far? © Cloud Security Alliance, 2015

The Top Ten © Cloud Security Alliance, November 2012 April

© Cloud Security Alliance, 2014.

© Cloud Security Alliance, Use Case(s) Modeling Analysis Implementation

Big Data Analytics Report © Cloud Security Alliance, September

© Cloud Security Alliance, Examples WINE Platform BD Analytics for Security Botnet monitoring APT Detection

The Top Ten Crypto Challenges © Cloud Security Alliance, March

Big Data Taxonomy © Cloud Security Alliance, Taxonomy = “The science or practice of classification”

Source:

Big Data Taxonomy © Cloud Security Alliance, September

© Cloud Security Alliance, 2015.

Other initiatives © Cloud Security Alliance, 2015

BDWG Other Initiatives We provided input for the upcoming NIST Big Data Standard. We provided comments to the White House Request for Comment on Big Data Privacy. Check out: what-the-white-house-wants-to-do-about-it/ what-the-white-house-wants-to-do-about-it/ Lots of media interviews. Particularly after we have published a deliverable © Cloud Security Alliance, 2015.

What is next? © Cloud Security Alliance, 2015

10 Sections 1.Secure Computations in Distributed Programming Frameworks 2.Security Best Practices for Non-Relational Data Stores 3.Secure Data Storage and Transactions Logs 4.End-point Input Validation/Filtering 5.Real-Time Security/Compliance Monitoring 6.Scalable and Composable Privacy-Preserving analytics 7.Crypto-Enforced Access Control and Secure Communication 8.Granular Access Control 9.Granular Audits 10.Data Provenance © Cloud Security Alliance, 2015.

Help needed… 1.Secure Computations in Distributed Programming Frameworks 2.Security Best Practices for Non-Relational Data Stores 3.Secure Data Storage and Transactions Logs 4.End-point Input Validation/Filtering 5.Real-Time Security/Compliance Monitoring 6.Scalable and Composable Privacy-Preserving analytics 7.Crypto-Enforced Access Control and Secure Communication 8.Granular Access Control 9.Granular Audits 10.Data Provenance © Cloud Security Alliance, 2015.

How to get involved? © Cloud Security Alliance, CSA Big Data Working Group Site: CSA, Big Data LinkedIn: Basecamp Project Collaboration Site Request Form For any questions/remarks/feedback, please contact either: WhoHow Sreeranga (Sree) Rajan Wilco van Ginkel Neel Sundaresan

? ? ? ? © Cloud Security Alliance, 2015